@the-ai-company/cbio-node-runtime 1.59.1 → 1.61.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +7 -4
- package/dist/clients/agent/client.d.ts +6 -0
- package/dist/clients/agent/client.js.map +1 -1
- package/dist/clients/owner/client.d.ts +9 -7
- package/dist/clients/owner/client.js +46 -11
- package/dist/clients/owner/client.js.map +1 -1
- package/dist/clients/owner/contracts.d.ts +22 -11
- package/dist/clients/owner/index.d.ts +1 -1
- package/dist/runtime/index.d.ts +1 -1
- package/dist/vault-core/contracts.d.ts +87 -3
- package/dist/vault-core/contracts.js +2 -0
- package/dist/vault-core/contracts.js.map +1 -1
- package/dist/vault-core/core.d.ts +14 -1
- package/dist/vault-core/core.js +254 -24
- package/dist/vault-core/core.js.map +1 -1
- package/dist/vault-core/defaults.d.ts +1 -0
- package/dist/vault-core/defaults.js +8 -4
- package/dist/vault-core/defaults.js.map +1 -1
- package/dist/vault-core/index.d.ts +1 -1
- package/dist/vault-core/index.js.map +1 -1
- package/dist/vault-core/persistence.d.ts +1 -0
- package/dist/vault-core/persistence.js +6 -3
- package/dist/vault-core/persistence.js.map +1 -1
- package/dist/vault-core/tool-metadata.js +4 -4
- package/dist/vault-core/tool-metadata.js.map +1 -1
- package/dist/vault-ingress/index.d.ts +16 -0
- package/dist/vault-ingress/index.js +34 -2
- package/dist/vault-ingress/index.js.map +1 -1
- package/docs/REFERENCE.md +9 -5
- package/docs/api/README.md +5 -5
- package/docs/api/classes/IdentityError.md +1 -1
- package/docs/api/classes/OwnerClientError.md +1 -1
- package/docs/api/classes/VaultCore.md +97 -1
- package/docs/api/classes/VaultCoreError.md +1 -1
- package/docs/api/enumerations/IdentityErrorCode.md +1 -1
- package/docs/api/enumerations/OwnerClientErrorCode.md +1 -1
- package/docs/api/functions/createAgentClient.md +1 -1
- package/docs/api/functions/createIdentity.md +1 -1
- package/docs/api/functions/createOwnerHttpFlowBoundary.md +1 -1
- package/docs/api/functions/createOwnerSession.md +1 -1
- package/docs/api/functions/createPersistentVaultCoreDependencies.md +1 -1
- package/docs/api/functions/createStandardAcquireBoundary.md +1 -1
- package/docs/api/functions/createStandardDispatchBoundary.md +1 -1
- package/docs/api/functions/createVault.md +1 -1
- package/docs/api/functions/createVaultClient.md +1 -1
- package/docs/api/functions/createVaultCore.md +1 -1
- package/docs/api/functions/createVaultCoreDependencies.md +1 -1
- package/docs/api/functions/createVaultService.md +1 -1
- package/docs/api/functions/createWorkspaceStorage.md +1 -1
- package/docs/api/functions/deriveIdentityId.md +1 -1
- package/docs/api/functions/deriveVaultWorkingKeyFromPassword.md +1 -1
- package/docs/api/functions/getDefaultWorkspaceDir.md +1 -1
- package/docs/api/functions/handleVaultAgentControlHttp.md +1 -1
- package/docs/api/functions/handleVaultHttpDispatch.md +1 -1
- package/docs/api/functions/initializeVaultCustody.md +1 -1
- package/docs/api/functions/listVaults.md +1 -1
- package/docs/api/functions/readVaultProfile.md +1 -1
- package/docs/api/functions/recoverVault.md +1 -1
- package/docs/api/functions/recoverVaultWorkingKey.md +1 -1
- package/docs/api/functions/restoreIdentity.md +1 -1
- package/docs/api/functions/updateVaultMetadata.md +1 -1
- package/docs/api/functions/wrapVaultCoreAsVaultService.md +1 -1
- package/docs/api/functions/writeVaultProfile.md +1 -1
- package/docs/api/interfaces/AgentClient.md +7 -1
- package/docs/api/interfaces/AgentDispatchIntent.md +1 -1
- package/docs/api/interfaces/AgentDispatchTransport.md +1 -1
- package/docs/api/interfaces/AgentIdentity.md +1 -1
- package/docs/api/interfaces/AgentSigner.md +1 -1
- package/docs/api/interfaces/AgentSubmitCapabilityRequestInput.md +1 -1
- package/docs/api/interfaces/CbioRuntime.md +1 -1
- package/docs/api/interfaces/CreateAgentClientOptions.md +1 -1
- package/docs/api/interfaces/CreateIdentityOptions.md +1 -1
- package/docs/api/interfaces/CreateOwnerSessionOptions.md +1 -1
- package/docs/api/interfaces/CreatePersistentVaultCoreDependenciesOptions.md +1 -1
- package/docs/api/interfaces/CreateVaultClientOptions.md +1 -1
- package/docs/api/interfaces/CreateVaultOptions.md +1 -1
- package/docs/api/interfaces/CreatedVault.md +1 -1
- package/docs/api/interfaces/DefaultPolicyEngineOptions.md +1 -1
- package/docs/api/interfaces/IStorageProvider.md +1 -1
- package/docs/api/interfaces/InitializeVaultCustodyOptions.md +1 -1
- package/docs/api/interfaces/InitializedVaultCustody.md +1 -1
- package/docs/api/interfaces/OwnerAgentProvisionResult.md +1 -1
- package/docs/api/interfaces/{OwnerStoreSecretInput.md → OwnerCreateSecretInput.md} +2 -2
- package/docs/api/interfaces/{VaultDeleteSecretInput.md → OwnerRemoveSecretInput.md} +2 -2
- package/docs/api/interfaces/OwnerSensitiveActionConfirmation.md +1 -1
- package/docs/api/interfaces/OwnerSensitiveActionContext.md +1 -1
- package/docs/api/interfaces/OwnerSession.md +1 -1
- package/docs/api/interfaces/{OwnerWriteSecretInput.md → OwnerUpdateSecretInput.md} +2 -2
- package/docs/api/interfaces/RecoverVaultOptions.md +1 -1
- package/docs/api/interfaces/RecoveredVault.md +1 -1
- package/docs/api/interfaces/RestoreIdentityOptions.md +1 -1
- package/docs/api/interfaces/Signer.md +1 -1
- package/docs/api/interfaces/VaultApproveCapabilityRequestInput.md +7 -1
- package/docs/api/interfaces/VaultApproveDispatchInput.md +1 -1
- package/docs/api/interfaces/VaultAuditQueryInput.md +1 -1
- package/docs/api/interfaces/VaultClient.md +55 -23
- package/docs/api/interfaces/VaultCoreDependenciesOptions.md +1 -1
- package/docs/api/interfaces/VaultCreateAgentInput.md +1 -1
- package/docs/api/interfaces/VaultExportSecretInput.md +1 -1
- package/docs/api/interfaces/VaultGrantCapabilityInput.md +1 -1
- package/docs/api/interfaces/VaultGrantCapabilityRequest.md +1 -1
- package/docs/api/interfaces/VaultIdentity.md +1 -1
- package/docs/api/interfaces/VaultImportAgentInput.md +1 -1
- package/docs/api/interfaces/VaultIssueSessionTokenInput.md +1 -1
- package/docs/api/interfaces/VaultListAgentsInput.md +1 -1
- package/docs/api/interfaces/VaultListCapabilitiesInput.md +1 -1
- package/docs/api/interfaces/VaultListSecretsInput.md +1 -1
- package/docs/api/interfaces/VaultMetadata.md +1 -1
- package/docs/api/interfaces/VaultObject.md +1 -1
- package/docs/api/interfaces/VaultProfile.md +1 -1
- package/docs/api/interfaces/VaultReadAgentPrivateKeyInput.md +1 -1
- package/docs/api/interfaces/VaultReadSecretPlaintextInput.md +1 -1
- package/docs/api/interfaces/VaultRegisterFlowInput.md +1 -1
- package/docs/api/interfaces/VaultRevokeCapabilityInput.md +1 -1
- package/docs/api/interfaces/VaultRevokeSessionTokenInput.md +1 -1
- package/docs/api/interfaces/VaultSigner.md +1 -1
- package/docs/api/interfaces/VaultSubmitCapabilityRequestInput.md +1 -1
- package/docs/api/interfaces/VaultUpdateAgentInput.md +1 -1
- package/docs/api/type-aliases/AgentCapabilityEnvelope.md +1 -1
- package/docs/api/type-aliases/AgentVisibleSecretRecord.md +1 -1
- package/docs/api/type-aliases/CbioRuntimeModule.md +1 -1
- package/docs/api/type-aliases/OwnerGrantCapabilityInput.md +1 -1
- package/docs/api/variables/DEFAULT_VAULT_KEY_CUSTODY_BLOB_KEY.md +1 -1
- package/docs/zh/README.md +4 -1
- package/package.json +1 -1
|
@@ -1,4 +1,4 @@
|
|
|
1
|
-
[**CBIO Node Runtime Agent API v1.
|
|
1
|
+
[**CBIO Node Runtime Agent API v1.61.0**](../README.md)
|
|
2
2
|
|
|
3
3
|
***
|
|
4
4
|
|
|
@@ -6,6 +6,9 @@
|
|
|
6
6
|
|
|
7
7
|
A client for agents to perform authorized operations (e.g., dispatch HTTP requests with secrets).
|
|
8
8
|
This client uses a delegated capability granted by the owner.
|
|
9
|
+
Agents can use secrets and request broader access, but they do not directly manage
|
|
10
|
+
the secret lifecycle inside the vault. Newly obtained credentials are persisted only
|
|
11
|
+
through owner actions or owner-configured vault flows that explicitly capture them.
|
|
9
12
|
|
|
10
13
|
## Methods
|
|
11
14
|
|
|
@@ -64,6 +67,9 @@ const result = await agent.agentDispatch({
|
|
|
64
67
|
|
|
65
68
|
Introspects the current runtime environment, providing identity, capabilities, and a toolbox manifest.
|
|
66
69
|
Equivalent to '--help' or 'llms.txt' for the agent.
|
|
70
|
+
This is the primary place where an agent should learn its operational boundary:
|
|
71
|
+
it can use existing secrets and request more permission, but it cannot directly
|
|
72
|
+
create, update, or remove secrets in the vault.
|
|
67
73
|
|
|
68
74
|
#### Returns
|
|
69
75
|
|
|
@@ -1,4 +1,4 @@
|
|
|
1
|
-
[**CBIO Node Runtime Agent API v1.
|
|
1
|
+
[**CBIO Node Runtime Agent API v1.61.0**](../README.md)
|
|
2
2
|
|
|
3
3
|
***
|
|
4
4
|
|
|
@@ -6,6 +6,12 @@
|
|
|
6
6
|
|
|
7
7
|
## Properties
|
|
8
8
|
|
|
9
|
+
### read?
|
|
10
|
+
|
|
11
|
+
> `optional` **read?**: `CapabilityReadPolicy`
|
|
12
|
+
|
|
13
|
+
***
|
|
14
|
+
|
|
9
15
|
### requestedAt?
|
|
10
16
|
|
|
11
17
|
> `optional` **requestedAt?**: `string`
|
|
@@ -1,4 +1,4 @@
|
|
|
1
|
-
[**CBIO Node Runtime Agent API v1.
|
|
1
|
+
[**CBIO Node Runtime Agent API v1.61.0**](../README.md)
|
|
2
2
|
|
|
3
3
|
***
|
|
4
4
|
|
|
@@ -92,21 +92,21 @@ The private key is stored in the vault for managed custody.
|
|
|
92
92
|
|
|
93
93
|
***
|
|
94
94
|
|
|
95
|
-
###
|
|
95
|
+
### ownerCreateSecret()
|
|
96
96
|
|
|
97
|
-
> **
|
|
97
|
+
> **ownerCreateSecret**(`input`): `Promise`\<`SecretRecord`\>
|
|
98
98
|
|
|
99
|
-
|
|
99
|
+
Inserts a new active secret into the vault.
|
|
100
100
|
|
|
101
101
|
#### Parameters
|
|
102
102
|
|
|
103
103
|
##### input
|
|
104
104
|
|
|
105
|
-
[`
|
|
105
|
+
[`OwnerCreateSecretInput`](OwnerCreateSecretInput.md)
|
|
106
106
|
|
|
107
107
|
#### Returns
|
|
108
108
|
|
|
109
|
-
`Promise`\<`
|
|
109
|
+
`Promise`\<`SecretRecord`\>
|
|
110
110
|
|
|
111
111
|
***
|
|
112
112
|
|
|
@@ -144,6 +144,22 @@ Exports a secret's plaintext.
|
|
|
144
144
|
|
|
145
145
|
***
|
|
146
146
|
|
|
147
|
+
### ownerGetRequest()
|
|
148
|
+
|
|
149
|
+
> **ownerGetRequest**(`input`): `Promise`\<`OwnerRequestRecord`\>
|
|
150
|
+
|
|
151
|
+
#### Parameters
|
|
152
|
+
|
|
153
|
+
##### input
|
|
154
|
+
|
|
155
|
+
`VaultGetRequestInput`
|
|
156
|
+
|
|
157
|
+
#### Returns
|
|
158
|
+
|
|
159
|
+
`Promise`\<`OwnerRequestRecord`\>
|
|
160
|
+
|
|
161
|
+
***
|
|
162
|
+
|
|
147
163
|
### ownerGrantCapability()
|
|
148
164
|
|
|
149
165
|
> **ownerGrantCapability**(`input`): `Promise`\<`AgentCapability`\>
|
|
@@ -256,6 +272,22 @@ Lists all active capabilities granted to agents.
|
|
|
256
272
|
|
|
257
273
|
***
|
|
258
274
|
|
|
275
|
+
### ownerListRequests()
|
|
276
|
+
|
|
277
|
+
> **ownerListRequests**(`input?`): `Promise`\<readonly `OwnerVisibleRequestRecord`[]\>
|
|
278
|
+
|
|
279
|
+
#### Parameters
|
|
280
|
+
|
|
281
|
+
##### input?
|
|
282
|
+
|
|
283
|
+
`VaultListRequestsInput`
|
|
284
|
+
|
|
285
|
+
#### Returns
|
|
286
|
+
|
|
287
|
+
`Promise`\<readonly `OwnerVisibleRequestRecord`[]\>
|
|
288
|
+
|
|
289
|
+
***
|
|
290
|
+
|
|
259
291
|
### ownerListSecrets()
|
|
260
292
|
|
|
261
293
|
> **ownerListSecrets**(`input?`): `Promise`\<readonly `AgentVisibleSecretRecord`[]\>
|
|
@@ -356,17 +388,17 @@ Registers a reusable HTTP request template for complex secret exchange patterns.
|
|
|
356
388
|
|
|
357
389
|
***
|
|
358
390
|
|
|
359
|
-
###
|
|
391
|
+
### ownerRemoveSecret()
|
|
360
392
|
|
|
361
|
-
> **
|
|
393
|
+
> **ownerRemoveSecret**(`input`): `Promise`\<`void`\>
|
|
362
394
|
|
|
363
|
-
|
|
395
|
+
Logically removes the current active secret.
|
|
364
396
|
|
|
365
397
|
#### Parameters
|
|
366
398
|
|
|
367
399
|
##### input
|
|
368
400
|
|
|
369
|
-
[`
|
|
401
|
+
[`OwnerRemoveSecretInput`](OwnerRemoveSecretInput.md)
|
|
370
402
|
|
|
371
403
|
#### Returns
|
|
372
404
|
|
|
@@ -374,15 +406,17 @@ Revokes a previously granted capability.
|
|
|
374
406
|
|
|
375
407
|
***
|
|
376
408
|
|
|
377
|
-
###
|
|
409
|
+
### ownerRevokeCapability()
|
|
378
410
|
|
|
379
|
-
> **
|
|
411
|
+
> **ownerRevokeCapability**(`input`): `Promise`\<`void`\>
|
|
412
|
+
|
|
413
|
+
Revokes a previously granted capability.
|
|
380
414
|
|
|
381
415
|
#### Parameters
|
|
382
416
|
|
|
383
417
|
##### input
|
|
384
418
|
|
|
385
|
-
[`
|
|
419
|
+
[`VaultRevokeCapabilityInput`](VaultRevokeCapabilityInput.md)
|
|
386
420
|
|
|
387
421
|
#### Returns
|
|
388
422
|
|
|
@@ -390,21 +424,19 @@ Revokes a previously granted capability.
|
|
|
390
424
|
|
|
391
425
|
***
|
|
392
426
|
|
|
393
|
-
###
|
|
394
|
-
|
|
395
|
-
> **ownerStoreSecret**(`input`): `Promise`\<`SecretRecord`\>
|
|
427
|
+
### ownerRevokeSessionToken()
|
|
396
428
|
|
|
397
|
-
|
|
429
|
+
> **ownerRevokeSessionToken**(`input`): `Promise`\<`void`\>
|
|
398
430
|
|
|
399
431
|
#### Parameters
|
|
400
432
|
|
|
401
433
|
##### input
|
|
402
434
|
|
|
403
|
-
[`
|
|
435
|
+
[`VaultRevokeSessionTokenInput`](VaultRevokeSessionTokenInput.md)
|
|
404
436
|
|
|
405
437
|
#### Returns
|
|
406
438
|
|
|
407
|
-
`Promise`\<`
|
|
439
|
+
`Promise`\<`void`\>
|
|
408
440
|
|
|
409
441
|
***
|
|
410
442
|
|
|
@@ -440,17 +472,17 @@ Securely stores a new secret in the vault.
|
|
|
440
472
|
|
|
441
473
|
***
|
|
442
474
|
|
|
443
|
-
###
|
|
475
|
+
### ownerUpdateSecret()
|
|
444
476
|
|
|
445
|
-
> **
|
|
477
|
+
> **ownerUpdateSecret**(`input`): `Promise`\<`SecretRecord`\>
|
|
446
478
|
|
|
447
|
-
|
|
479
|
+
Inserts a new successor secret and marks the previous active version as superseded.
|
|
448
480
|
|
|
449
481
|
#### Parameters
|
|
450
482
|
|
|
451
483
|
##### input
|
|
452
484
|
|
|
453
|
-
[`
|
|
485
|
+
[`OwnerUpdateSecretInput`](OwnerUpdateSecretInput.md)
|
|
454
486
|
|
|
455
487
|
#### Returns
|
|
456
488
|
|